网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You must track all transactions that modify certain tables in the sales schema for at least three years. Automatic undo management is enabled for the database with a retention of one day. Which two must you do to track the transactions?()
A

Enable supplemental logging for the database.

B

Specify undo retention guarantee for the database.

C

Create a Flashback Data Archive in the tablespace where the tables are stored.

D

Create a Flashback Data Archive in any suitable tablespace.

E

Enable Flashback Data Archiving for the tables that require tracking


参考答案

参考解析
解析: 暂无解析
更多 “多选题You must track all transactions that modify certain tables in the sales schema for at least three years. Automatic undo management is enabled for the database with a retention of one day. Which two must you do to track the transactions?()AEnable supplemental logging for the database.BSpecify undo retention guarantee for the database.CCreate a Flashback Data Archive in the tablespace where the tables are stored.DCreate a Flashback Data Archive in any suitable tablespace.EEnable Flashback Data Archiving for the tables that require tracking” 相关考题
考题 A:I haven't eaten all day.B: You __ be very hungry.A. shouldB. have toC. must

考题 A: I haven't sat down all day.B: You _____be very tired.A. couldB. have toC. must

考题 You need to maintain a record of all transactions on some tables for at least three years. Automatic undo management is enabled for the database.What must you do accomplish this task?() A. Enable supplemental logging for the database.B. Specify undo retention guarantee for the databaseC. Create Flashback Data Archive in the tablespace where the tables are stored.D. Create Flashback Data Archive and enable Flashback Data Archive for specific tables

考题 Which describes the default behavior when you create a table? () A. The table is accessible to all users.B. Tables are created in the public schema.C. Tables are created in your schema.D. Tables are created in the DBA schema.E. You must specify the schema when the table is created.

考题 What is true about joining tables through an equijoin? () A. You can join a maximum of two tables through an equijoin.B. You can join a maximum of two columns through an equijoin.C. You specify an equijoin condition in the SELECT or FROM clauses of a SELECT statement.D. To join two tables through an equijoin, the columns in the join condition must be primary key and foreign key columns.E. You can join n tables (all having single column primary keys) in a SQL statement by specifying a minimum of n-1 join conditions.

考题 What is necessary for your query on an existing view to execute successfully? () A. The underlying tables must have data.B. You need SELECT privileges on the view.C. The underlying tables must be in the same schema.D. You need SELECT privileges only on the underlying tables.

考题 In which case would you use a FULL OUTER JOIN? () A. Both tables have NULL values.B. You want all unmatched data from one table.C. You want all matched data from both tables.D. You want all unmatched data from both tables.E. One of the tables has more data than the other.F. You want all matched and unmatched data from only one table.

考题 You must track all transactions that modify certain tables in the sales schema for at least three years.Automatic undo management is enabled for the database with a retention of one day.Which two must you do to track the transactions?()A. Enable supplemental logging for the database.B. Specify undo retention guarantee for the database.C. Create a Flashback Data Archive in the tablespace where the tables are stored.D. Create a Flashback Data Archive in any suitable tablespace.E. Enable Flashback Data Archiving for the tables that require tracking

考题 You are the administrator of a SQL Server 2000 computer. The server is configured as shown in the Database Server Configuration exhibit.You need to create a new database named Inventory. Employees in your company will use the Inventory database to track inventory data. Users will require immediate responses to queries that help them locate where parts are stored. The tables in the database will be configured as shown in the Database Schema exhibit.The database will consume 14 GB of disk space. You must configure the data files and transaction log to accelerate query response time.Which two courses of action should you take? (Each correct answer represents part of the solution. Choose two.)A. On drive C, create a transaction log.On drive D, create a data file in the PRIMARY filegroup.On drive E, create a data file in the SECONDARY filegroup.B. On each drive, create a transaction log.On each drive, create a data file in the PRIMARY filegroup.C. On drive D, create a transaction log.On drive E, create a data file in the PRIMARY filegroup.D. On the PRIMARY filegroup, create all tables and all indexes.E. On the PRIMARY filegroup, create all tables. On the SECONDARY filegroup, create all indexes.F. On the PRIMARY filegroup, create the Parts table and its indexes.On the SECONDARY filegroup, create all other tables and their indexes.

考题 You have a file server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Shadow Copiesis enabled for all volumes by using the default settings.Server1 is configured as shown in the following table.You need to provide at least 10 GB of free space on volume D. You must achieve this goal without moving thecontents of the shared folders.What should you do?()A. Modify the Disk Quota settings.B. Modify the virtual memory setting.C. Modify the Shadow Copies settings.D. Modify the Caching settings for all shared folders.

考题 You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.You want to minimize changes to your security model and to your database applications. How should you modify the database?A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.

考题 I must apologize to you for the delay.()AThat's all right.BNo trouble at all.CAll the best.DYou are welcome.

考题 I must apologize to you for the delay.()A、That's all right.B、No trouble at all.C、All the best.D、You are welcome.

考题 You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table

考题 You are working as a DBA on the decision support system. There is a business requirement to track and store all transactions for at least three years for a few tables in the database. Automatic undo management is enabled in the database.  Which configuration should you use to accomplish this task?()A、 Enable Flashback Data Archive for the tables.B、 Specify undo retention guarantee for the database.C、 Enable supplemental logging for the database.D、 Query V$UNDOSTAT to determine the amount of undo that will be generated and create an undo tablespace for that size.E、 Create Flashback Data Archive on the tablespace on which the tables are stored.

考题 What is necessary for your query on an existing view to execute successfully?()A、The underlying tables must have data.B、You need SELECT privileges on the view.C、The underlying tables must be in the same schema.D、You need SELECT privileges only on the underlying tables.

考题 You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis.  How would you achieve this()A、by using triggersB、by using Data PumpC、by using external tablesD、by using anonymous PL/SQL blocks

考题 What is true about joining tables through an equijoin?()A、You can join a maximum of two tables through an equijoin.B、You can join a maximum of two columns through an equijoin.C、You specify an equijoin condition in the SELECT or FROM clauses of a SELECT statement.D、To join two tables through an equijoin, the columns in the join condition must be primary key and foreign key columns.E、You can join n tables (all having single column primary keys) in a SQL statement by specifying a minimum of n-1 join conditions.

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance which uses mixed authentication mode. The instance runs on a computer which has Windows Server 2003 installed. You must make sure that the SQL Server 2008 authenticated logins follow the same password complexity rules that are enforced by Windows Server 2003. Besides this, you must make sure that the password complexity rules continue to be enforced.  So what action should you perform to achieve this goal?() A、You should create an SQL Server Agent job. If a rule violation is detected, the job runs periodically to raise an alert B、You should modify all logins by using the ALTER LOGIN ... HASHED statement. C、You should modify all logins by using the ALTER LOGIN ... CHECK_POLICY = ON statement to. D、You should modify all logins by using the ALTER LOGIN ... CHECK_EXPIRATION = ON statement. E、You should create a policy by using Policy-Based Management. The policy prevents any violation of these rules

考题 You need to design a method to log changes that are made to servers and domain controllers. You also need to track when administrators modify local security account manager objects on servers. What should you do?()A、Enable failure audit for privilege user and object access on all servers and domain controllersB、Enable success audit for policy change and account management on all servers and domain controllersC、Enable success audit for process tracking and logon events on all servers and domain controllersD、Enable failure audit for system events and directory service access on all servers and domain controllers

考题 You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.Xxx has a distribution group named KingData.You receive instruction from Xxx to allow an employee Mia Hamm to review all mail to KingData and approve it.How can you ensure that the above goal is achieved but at the same time Mia Hamm must not be able to change group membership?()A、You must modify the properties of KingDataB、You must enable folder redirection.C、You must allocate Mia Hamm as a group moderator for KingData.D、You must implement recipient filtering.

考题 You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx .What actions must you take to allow a room mailbox to automatically take requests for meetings?()A、You must use log transactions.B、You must use Calendar Repair Assistant (CRA).C、You must select the resource booking attendant.D、You must set up Task Scheduler.

考题 单选题You are working as a DBA on the decision support system. There is a business requirement to track and store all transactions for at least three years for a few tables in the database. Automatic undo management is enabled in the database.  Which configuration should you use to accomplish this task?()A  Enable Flashback Data Archive for the tables.B  Specify undo retention guarantee for the database.C  Enable supplemental logging for the database.D  Query V$UNDOSTAT to determine the amount of undo that will be generated and create an undo tablespace for that size.E  Create Flashback Data Archive on the tablespace on which the tables are stored.

考题 单选题You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()A functionsB packagesC proceduresD database triggersE anonymous PL/SQL block

考题 单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis.  How would you achieve this?()A by using triggersB by using external tablesC by using anonymous PL/SQL blocksD by auditing all DML operations on the table

考题 单选题I must apologize to you for the delay.()A That's all right.B No trouble at all.C All the best.D You are welcome.

考题 单选题You have a print server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has a shared printer named Printer1. You need to track the usage for Printer1. The tracked information must indicate the user that submitted the print job. You enable auditing for object access on Server1. What should you do next? ()A From the Performance console, create a counter log.B From the properties of Printer1, modify the Device settings.C From the properties of Printer1, modify the Security settings.D From the Print Server properties, modify the Advanced setting.

考题 单选题You need to maintain a record of all transactions on some tables for at least three years. Automatic undo management is enabled for the database. What must you do accomplish this task?()A Enable supplemental logging for the database.B Specify undo retention guarantee for the databaseC Create Flashback Data Archive in the tablespace where the tables are stored.D Create Flashback Data Archive and enable Flashback Data Archive for specific tables